Method for carrying out a two-factor authentication
a two-factor authentication and authentication method technology, applied in the direction of user identity/authority verification, digital transmission, securing communication, etc., can solve the problems of currently enabled eid functionality and user execution time, and achieve the effect of minimizing the likelihood of unintentional interruption of authentications and token servers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040]Hereinafter, exemplary embodiments of the invention will be described in detail with reference to FIGS. 1-3. Changes with reference to the method described are possible within the scope of protection defined by the claims.
[0041]FIG. 1 schematically shows the sequence of a two-factor authentication according to the invention between a client and a relying party. A client is, for example, a mobile telephone, a tablet PC, a computer (PC) or the like. By way of example, a relying party can be a facility such as a host, a server, or the like that makes possible access to a service, particularly a secure software application.
[0042]For the two-factor authentication, the industry standard U2F (Universal Second Factor) is preferably used. The U2F specification is managed by the FIDO Alliance.
[0043]In the two-factor authentication according to the invention, first (step 1) an authentication is carried out between the client and the relying party. This can be carried out, for example, by...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


